CVE-2024-44965

Updated: 2024-10-04

CWE: NVD-CWE-noinfo

Description:

In the Linux kernel, the following vulnerability has been resolved: x86/mm: Fix pti_clone_pgtable() alignment assumption Guenter reported dodgy crashes on an i386-nosmp build using GCC-11 that had the form of endless traps until entry stack exhaust and then #DF from the stack guard. It turned out that pti_clone_pgtable() had alignment assumptions on the start address, notably it hard assumes start is PMD aligned. This is true on x86_64, but very much not true on i386. These assumptions can cause the end condition to malfunction, leading to a 'short' clone. Guess what happens when the user mapping has a short copy of the entry text? Use the correct increment form for addr to avoid alignment assumptions.

CVSS3: 5.5


Vendor State

OS Vendor version Errata
Ubuntu 20.04 5.4.0-200.220 USN-7088-1
Oracle Linux 7 UEK 6 5.4.17-2136.336.5.1.el7uek ELSA-2024-12780
Oracle Linux 8 UEK 6 5.4.17-2136.336.5.1.el8uek ELSA-2024-12780
Ubuntu 20.04 AWS 5.4.0-1135.145 USN-7088-4
Debian 11 5.10.226-1 DLA-3912-1
Ubuntu 22.04 5.15.0-125.135 USN-7100-1
Debian 11 cloud 5.10.226-1 DLA-3912-1
Ubuntu 20.04 HWE AWS 5.15.0-1072.78~20.04.1 USN-7100-1
Ubuntu 20.04 GCP 5.4.0-1139.148 USN-7088-1

KernelCare State

OS Original kernel version State
Ubuntu 18.04 HWE Focal
Planned
Ubuntu 20.04
Planned
Oracle Linux 7 UEK 6
Ready For Release
Oracle Linux 8 UEK 6
Ready For Release
Ubuntu 20.04 AWS
Planned
Debian 11
Planned
Ubuntu 22.04
Planned
Debian 11 cloud
Planned
Ubuntu 20.04 HWE AWS
Planned
Ubuntu 20.04 GCP
Planned